VID |
28175 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The Novell Client software has a buffer overflow vulnerability in the 'ndppnt.dll' library. Novell Client for Windows is vulnerable to a buffer overflow attack, caused by improper bounds checking in the NDPS (Novell Distributed Print Services) Print Provider for Windows component (ndppnt.dll). By exploiting an unspecified vulnerability, a remote or local attacker could overflow a buffer and execute arbitraty code on the affected system or cause the system to crash.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974843.htm http://secunia.com/advisories/23271
* Platforms Affected: Novell Distributed Print Services (NDPS) versions prior to 4.91 Post-SP3 Microsoft Windows Any version |
Recommendation |
Install the 491psp3_ndppnt.exe patch file, as listed in the Novell Technical Information Document TID2974843 at http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974843.htm |
Related URL |
CVE-2006-6443 (CVE) |
Related URL |
21479 (SecurityFocus) |
Related URL |
30873 (ISS) |
|